defense in depth

back to index

56 results

Our 50-State Border Crisis: How the Mexican Border Fuels the Drug Epidemic Across America

by Howard G. Buffett  · 2 Apr 2018  · 350pp  · 109,521 words

too many agents to staff inland checkpoints instead of stopping smugglers and illegal border crossers right at the border. BP uses a layered strategy called Defense in Depth that means there are roadside checkpoints as well as permanent checkpoints well inland of the border. Today, by law, only authorized federal agents can actually

Hirohito and the Making of Modern Japan

by Herbert P. Bix  · 1 Jan 2000  · 1,056pp  · 275,211 words

, without inflicting any serious damage on the American invasion force.96 After desperate fighting, in which Japanese ground commanders once again failed to prepare adequate defenses in depth, Saipan, Guam, and Tinian fell and quickly became forward U.S. bases for long-range B-29 (“Superfortress”) bombers. The capture of Saipan on July

One Bullet Away: The Making of a Marine Officer by Fick, Nathaniel C.(October 3, 2005) Hardcover

by Nathaniel C. Fick  · 14 Apr 2006

low overcast threatening rain. Helicopters could not fly under the weather, and jets above it couldn’t provide accurate close air support. Facing a coordinated defense-in-depth, with little idea of what lay to the north, the colonel decided to pull back two kilometers and set up a hasty defense on the

Hunting in the Shadows: The Pursuit of Al Qa'ida Since 9/11: The Pursuit of Al Qa'ida Since 9/11

by Seth G. Jones  · 29 Apr 2012  · 649pp  · 172,080 words

send messages, such as blankets and smoke and flares. The enemy, led by Mansour and supported by al Qa’ida fighters, planned to employ a “defense in depth” strategy if they were attacked, inflicting as many casualties as possible on American and allied soldiers instead of denying access. They would permit U.S

Future War: Preparing for the New Global Battlefield

by Robert H. Latiff  · 25 Sep 2017  · 158pp  · 46,353 words

, March 14, 2013. Echoing the concerns of senior combat leaders: Janine Davidson, “The Warrior Ethos at Risk: H. R. McMaster’s Remarkable Veterans Day Speech,” Defense in Depth blog, Council on Foreign Relations, November 18, 2014, https://fortunascorner.com/​2014/​11/​19/​the-warrior-ethos-at-risk-h-r-mcmasters-remarkable-veterans-day

tried to use OCO funds: Emerson Brooking and Janine Davidson, “How the Overseas Contingency Operations Fund Works—and Why Congress Wants to Make It Bigger,” Defense in Depth blog, Council on Foreign Relations, June 16, 2015, https://www.geopolintelligence.com/​how-the-overseas-contingency-operations-fund-works-and-why-congress-wants-to-make

The Longest Day

by Cornelius Ryan  · 1 Jan 1959  · 439pp  · 105,137 words

guns and other equipment if his plan of assault was to succeed, for Merville was no ordinary battery. Around it ranged a formidable series of defenses in depth. To get to the heart of the battery—four heavy guns in massive concrete emplacements—the 9th would have to pass through mine fields and

Hot: Living Through the Next Fifty Years on Earth

by Mark Hertsgaard  · 15 Jan 2011  · 326pp  · 48,727 words

protect Louisiana if we want to," said van Heerden, who, in his book The Storm, urged a three-layered approach to hurricane protection known as "defense in depth." "For your inner layer of defense," van Heerden told me, "you put hardened levees or flood walls in front of major population centers [such as

The Lion's Gate: On the Front Lines of the Six Day War

by Steven Pressfield  · 5 May 2014  · 531pp  · 139,948 words

, inevitably, one of scores of blockhouses and bricked-up strongpoints lining the corridor of minefields and barbed-wire entanglements that divided Jerusalem. A strategy of defense-in-depth is not possible in a nation that is only nine miles wide at its waist and whose commercial concentrations and population centers lie within artillery

wisdom on to their clients, the Egyptians. On top of this, Soviet engineers have overlaid the Russian system. Russian doctrine is linear. Its principle is defense in depth. You can recognize a Soviet position from the air by its multiple trench lines, one behind the other. In the rear of the first three

We Were Soldiers Once...and Young: Ia Drang - the Battle That Changed the War in Vietnam

by Harold G. Moore and Joseph L. Galloway  · 19 Oct 1991  · 496pp  · 162,951 words

behind their lines. There, taking up positions that gave them good fields of fire, the remnants of the 2nd Platoon men provided some measure of defense in depth to Charlie Company. But the loss of four men crossing the clearing convinced me that further internal movements were inadvisable until we reduced the enemy

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back

by Bruce Schneier  · 7 Feb 2023  · 306pp  · 82,909 words

is simplicity. Of course, many systems are naturally complex, but the simpler a system can be designed, the more secure it is likely to be. Defense in Depth: The basic idea is that one vulnerability shouldn’t destroy the whole system. In computer systems, the place you encounter this the most is multifactor

multifactor systems might include a biometric such as a fingerprint, or a small USB device you have to plug into your computer. For noncomputer systems, defense in depth is anything that prevents a single vulnerability from becoming a successful hack. It might be a deadbolt on your door in addition to the lock

mind, from our survival instincts to our craving for social status. They can be used against anyone. Protecting ourselves from cognitive hacks requires society-wide defense-in-depth: spanning education, regulation and—especially online—technical solutions. As digital technology occupies ever more of our attention, cognitive hacking is increasingly taking place by means

Cyber Grand Challenge, 228–29 de minimis rule, 249 debt financing, 101–2 decoy prices, 189 deep-fake technology, 192–93, 221 Deep Patient, 213 defense in depth, 59–60 Delaware Loophole, 130 DeSantis, Ron, 132–33 design process, 58–61 financial exchange hacks and, 85 simplicity in, 59, 80 threat modeling, 62

Cities Under Siege: The New Military Urbanism

by Stephen Graham  · 30 Oct 2009  · 717pp  · 150,288 words

The Gun

by C. J. Chivers  · 12 Oct 2010  · 845pp  · 197,050 words

The Tangled Web: A Guide to Securing Modern Web Applications

by Michal Zalewski  · 26 Nov 2011  · 570pp  · 115,722 words

Strategy: A History

by Lawrence Freedman  · 31 Oct 2013  · 1,073pp  · 314,528 words

War of Shadows: Codebreakers, Spies, and the Secret Struggle to Drive the Nazis From the Middle East

by Gershom Gorenberg  · 19 Jan 2021  · 555pp  · 163,712 words

A New History of the Future in 100 Objects: A Fiction

by Adrian Hon  · 5 Oct 2020  · 340pp  · 101,675 words

America in the World: A History of U.S. Diplomacy and Foreign Policy

by Robert B. Zoellick  · 3 Aug 2020

Reaganland: America's Right Turn 1976-1980

by Rick Perlstein  · 17 Aug 2020

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

by Nicole Perlroth  · 9 Feb 2021  · 651pp  · 186,130 words

The Long Game: China's Grand Strategy to Displace American Order

by Rush Doshi  · 24 Jun 2021  · 816pp  · 191,889 words

Why the West Rules--For Now: The Patterns of History, and What They Reveal About the Future

by Ian Morris  · 11 Oct 2010  · 1,152pp  · 266,246 words

Secrets and Lies: Digital Security in a Networked World

by Bruce Schneier  · 1 Jan 2000  · 470pp  · 144,455 words

The Seventh Sense: Power, Fortune, and Survival in the Age of Networks

by Joshua Cooper Ramo  · 16 May 2016  · 326pp  · 103,170 words

The Practice of Cloud System Administration: DevOps and SRE Practices for Web Services, Volume 2

by Thomas A. Limoncelli, Strata R. Chalup and Christina J. Hogan  · 27 Aug 2014  · 757pp  · 193,541 words

The Cold War

by Robert Cowley  · 5 May 1992  · 546pp  · 176,169 words

Ender's shadow

by Orson Scott Card  · 23 Nov 2000  · 361pp  · 143,442 words

Atrocity Archives

by Stross, Charles  · 13 Jan 2004  · 404pp  · 113,514 words

Not One Inch: America, Russia, and the Making of Post-Cold War Stalemate

by M. E. Sarotte  · 29 Nov 2021  · 791pp  · 222,536 words

On Thermonuclear War

by Herman Kahn  · 16 Jul 2007  · 1,117pp  · 270,127 words

The Diamond Age

by Neal Stephenson  · 2 May 2000  · 611pp  · 186,716 words

A Better War: The Unexamined Victories and Final Tragedy of America's Last Years in Vietnam

by Lewis Sorley  · 2 Jun 1999  · 565pp  · 160,402 words

Beautiful security

by Andy Oram and John Viega  · 15 Dec 2009  · 302pp  · 82,233 words

Debt of Honor

by Tom Clancy  · 2 Jan 1994

Executive Orders

by Tom Clancy  · 2 Jan 1996

The Precipice: Existential Risk and the Future of Humanity

by Toby Ord  · 24 Mar 2020  · 513pp  · 152,381 words

House to House: An Epic Memoir of War

by David Bellavia  · 4 Sep 2007  · 325pp  · 92,272 words

Without Remorse

by Tom Clancy  · 2 Jan 1993

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield  · 29 Mar 2020  · 1,380pp  · 190,710 words

Dangerous Waters: Modern Piracy and Terror on the High Seas

by John S. Burnett  · 1 Jan 2002  · 399pp  · 120,226 words

Visual Thinking: The Hidden Gifts of People Who Think in Pictures, Patterns, and Abstractions

by Temple Grandin, Ph.d.  · 11 Oct 2022

Scratch Monkey

by Stross, Charles  · 1 Jan 2011

Dead or Alive

by Tom Clancy and Grant (CON) Blackwood  · 7 Dec 2010  · 795pp  · 212,447 words

Site Reliability Engineering: How Google Runs Production Systems

by Betsy Beyer, Chris Jones, Jennifer Petoff and Niall Richard Murphy  · 15 Apr 2016  · 719pp  · 181,090 words

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

by Dafydd Stuttard and Marcus Pinto  · 30 Sep 2007  · 1,302pp  · 289,469 words

Spam Nation: The Inside Story of Organized Cybercrime-From Global Epidemic to Your Front Door

by Brian Krebs  · 18 Nov 2014  · 252pp  · 75,349 words

Multitool Linux: Practical Uses for Open Source Software

by Michael Schwarz, Jeremy Anderson and Peter Curtis  · 7 May 2002

Fall; Or, Dodge in Hell

by Neal Stephenson  · 3 Jun 2019  · 993pp  · 318,161 words

Guadalcanal Diary

by Richard Tregaskis  · 1 Mar 1943  · 264pp  · 80,849 words

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

by Justin Schuh  · 20 Nov 2006  · 2,054pp  · 359,149 words

Everyware: The Dawning Age of Ubiquitous Computing

by Adam Greenfield  · 14 Sep 2006  · 229pp  · 68,426 words

Seeking SRE: Conversations About Running Production Systems at Scale

by David N. Blank-Edelman  · 16 Sep 2018

Building Microservices

by Sam Newman  · 25 Dec 2014  · 540pp  · 103,101 words

Essential SQLAlchemy

by Rick Copeland  · 4 Jun 2008  · 357pp  · 63,071 words

Puppet 3 Cookbook

by John Arundel  · 25 Aug 2013  · 274pp  · 58,675 words

Software Engineering at Google: Lessons Learned From Programming Over Time

by Titus Winters, Tom Manshreck and Hyrum Wright  · 17 Mar 2020  · 214pp  · 31,751 words

Ansible for DevOps: Server and Configuration Management for Humans

by Jeff Geerling  · 9 Oct 2015  · 313pp  · 75,583 words